TITLE

ISED's encryption unit helps banks reach small merchants

AUTHOR(S)
J.L.P.
PUB. DATE
February 1996
SOURCE
Bank Marketing;Feb96, Vol. 28 Issue 2, p55
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Reports on ISED Corp.'s introduction of the secure encryption device (SED), a hardware-based encryption device that allows banks to provide small retail merchants access to electronic banking and credit/debit card transactions. Advantages.
ACCESSION #
9602220849

 

Related Articles

  • Hardware-based encryption for Internet payments. Lunt, Penny // ABA Banking Journal;Jan1996, Vol. 88 Issue 1, p66 

    Reports that ISED Corp. has developed a device that costs under $100 that encrypts and sends credit and debit card payments by telephone line over the Internet. Interchange rates.

  • Tales from the crypto. Bracco, Terre // Network World;05/22/2000, Vol. 17 Issue 21, p71 

    Evaluates the Rainbow Technologies CryptoSwift 600 and nCipher nForce 300 Cryptographic Accelerator. Functions and features; Key specifications; Capability to support data encryption transactions; Ease of use; Scalability; Overall performance.

  • OMLIS AND IBM DEBUT ENTERPRISE SECURITY TECHNOLOGY.  // Audiotex Update;Sep2015, Vol. 27 Issue 9, Special section p4 

    The article discusses the launch of the Secure Enterprise Messenger (SEM) encryption technology from International Business Machine (IBM) and Omlis.

  • ATM encryption: Faster, easier. Messmer, Ellen // Network World;02/08/99, Vol. 16 Issue 6, p30 

    Evaluates the asynchronous transfer mode (ATM) encryption units and services from various vendors. Includes Celotek CelloCase ATM encryption unit; Heuristic defense infrastructure and intrusion detection service from Pilot Network Services.

  • Prying Eyes, Keep Out. Branscum, Deborah // Newsweek (Atlantic Edition);06/12/2000 (Atlantic Edition), Vol. 135 Issue 24, p75 

    Discusses several companies that improve the privacy of e-mail systems. Programs by QVtech and Disappearing Inc. which work with Microsoft Outlook and allow messages to be read only by the designated recipient; How the software digitally encrypts messages; Details of ZipLip.com's offering;...

  • Enhanced authentication for WLAN-EPS interworking systems. Bassoli, R.; Marques, H.; Rodriguez, J.; Gruet, C.; Tafazolli, R. // Electronics Letters;9/17/2015, Vol. 51 Issue 19, p1544 

    Novel authentication procedures for interworking wireless local area networks and evolved packet system are proposed for the 3GPP TS 33.402 (released 12 September 2014) standard. The novel solutions mainly exploit public-key fully homomorphic encryption schemes and one-way functions. This not...

  • In-Sink-Erator says `thanks a million' to Pro Series contractors.  // Contractor Magazine;Nov95, Vol. 42 Issue 11, p14 

    Announces ISE's `Thanks A Million' Sweepstakes and Countdown rebate program for plumbing contractors. Success of Pro Series Disposers; Promotion period; Rebate coupons for products purchased; Contact information.

  • Chaos breeds order. Rambler, Mark; Hayden, Tom; Kwon, Beth // Newsweek (Pacific Edition);03/16/98 (Pacific Edition), Vol. 131 Issue 11, p8A 

    Mentions a data-encryption method created by Georgia Tech researchers Rajarshi Roy and Gregory Van Wiggeren. Use of a laser to hide sensitive data.

  • Selling to Professor Plum, in the library, with a key... van Someren, Alex // Communications News;Mar1998, Vol. 35 Issue 3, p68 

    Discusses various aspects of cryptographic accelerators, a device that installs on or in an electronic commerce service. Tips for choosing with accelerator to buy; Background information on basic encryption techniques; Encryption as a mathematical operation.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics